General

  • Target

    Server.exe

  • Size

    74KB

  • MD5

    d085619e4c4e286f3f207182f262bb78

  • SHA1

    ff6ad98157adb5e9758f43426dacf545bdf31846

  • SHA256

    d6195966f89685c5a8ffdd14126c263b92a33c74784f37fa1c52343acf7462b9

  • SHA512

    563e6dfdae98f8dc62f48a94db2f5856f13821da79b133d4bfd0a9d3a3b3d3f1e64dceb12d6257bc51ef0058cee528082223a2d607d5a8dddc94916c914454a6

  • SSDEEP

    1536:cOXUyccx4m3Cmv6PMVue9VdQuDI8H1bT/jqvQzcyLVclN:cOXUjcx4qB6PMVue9VdQeH1bT+vQjBY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

nxrmnlywreltjolzvyf

Attributes
  • delay

    1

  • install

    true

  • install_file

    x.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/YiSGydcq

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections